005fbb17a1
- Fix machineKey extraction regex to handle decryption attribute - Replace Base64.strict_encode64 with Rex::Text.encode_base64 - Add READ_FILE and EXTRACT_MACHINEKEY actions - Add PRODUCT option for CentreStack/Triofox support - Use different storage endpoints per product type - Update documentation with new options and actions
This is the folder where all of Metasploit's modules live. These modules are scripts in Ruby that interface with
Metasploit itself to perform some specific task. There are various types of modules, such as exploit modules to
exploit a vulnerability and gain a shell, auxiliary to perform a non-shell gaining activity, payloads for
Metasploit's various payloads (which are also modules), and post for post exploitation modules.